MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
path
Search

Docker Bug Allows Root Access To Host File System

Wednesday May 29, 2019. 08:47 PM , from Slashdot/Apple
Trailrunner7 shares a report: All of the current versions of Docker have a vulnerability that can allow an attacker to get read-write access to any path on the host server. The weakness is the result of a race condition in the Docker software and while there's a fix in the works, it has not yet been integrated. The bug is the result of the way that the Docker software handles some symbolic links, which are files that have paths to other directories or files. Researcher Aleksa Sarai discovered that in some situations, an attacker can insert his own symlink into a path during a short time window between the time that the path has been resolved and the time it is operated on. This is a variant of the time of check to time of use (TOCTOU) problem, specifically with the 'docker cp' command, which copies files to and from containers.

'The basic premise of this attack is that FollowSymlinkInScope suffers from a fairly fundamental TOCTOU attack. The purpose of FollowSymlinkInScope is to take a given path and safely resolve it as though the process was inside the container. After the full path has been resolved, the resolved path is passed around a bit and then operated on a bit later (in the case of 'docker cp' it is opened when creating the archive that is streamed to the client),' Sarai said in his advisory on the problem. 'If an attacker can add a symlink component to the path after the resolution but beforeit is operated on, then you could end up resolving the symlink path component on the host as root. In the case of 'docker cp' this gives you read and write access to any path on the host.'

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/tlTo-_MZj0U/docker-bug-allows-root-access-to-host-file-syst
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Sat 20 - 01:20 CEST